upgrade to 23.11
This commit is contained in:
parent
6084f3d570
commit
3c3758b852
33
flake.lock
33
flake.lock
@ -110,16 +110,16 @@
|
|||||||
]
|
]
|
||||||
},
|
},
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1700392168,
|
"lastModified": 1700814205,
|
||||||
"narHash": "sha256-v5LprEFx3u4+1vmds9K0/i7sHjT0IYGs7u9v54iz/OA=",
|
"narHash": "sha256-lWqDPKHRbQfi+zNIivf031BUeyciVOtwCwTjyrhDB5g=",
|
||||||
"owner": "nix-community",
|
"owner": "nix-community",
|
||||||
"repo": "home-manager",
|
"repo": "home-manager",
|
||||||
"rev": "28535c3a34d79071f2ccb68671971ce0c0984d7e",
|
"rev": "aeb2232d7a32530d3448318790534d196bf9427a",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
"owner": "nix-community",
|
"owner": "nix-community",
|
||||||
"ref": "release-23.05",
|
"ref": "release-23.11",
|
||||||
"repo": "home-manager",
|
"repo": "home-manager",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
}
|
}
|
||||||
@ -162,32 +162,16 @@
|
|||||||
},
|
},
|
||||||
"nixpkgs": {
|
"nixpkgs": {
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1700989516,
|
"lastModified": 1701058557,
|
||||||
"narHash": "sha256-oKbmPa2wpTHh9XB3+zIx97uMZGNnp97GPliKKG2/plo=",
|
"narHash": "sha256-fux7HlrnoNs93MN0kET4AfiYwg/expoasndRCFeDRyk=",
|
||||||
"owner": "NixOS",
|
"owner": "NixOS",
|
||||||
"repo": "nixpkgs",
|
"repo": "nixpkgs",
|
||||||
"rev": "d2e4de209881b38392933fabf303cde3454b0b4c",
|
"rev": "070b5cf9f70bc7ef2dfd739a1f7d6c563fe64bd1",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
"owner": "NixOS",
|
"owner": "NixOS",
|
||||||
"ref": "nixos-23.05",
|
"ref": "nixos-23.11",
|
||||||
"repo": "nixpkgs",
|
|
||||||
"type": "github"
|
|
||||||
}
|
|
||||||
},
|
|
||||||
"nixpkgs-unstable": {
|
|
||||||
"locked": {
|
|
||||||
"lastModified": 1700794826,
|
|
||||||
"narHash": "sha256-RyJTnTNKhO0yqRpDISk03I/4A67/dp96YRxc86YOPgU=",
|
|
||||||
"owner": "NixOS",
|
|
||||||
"repo": "nixpkgs",
|
|
||||||
"rev": "5a09cb4b393d58f9ed0d9ca1555016a8543c2ac8",
|
|
||||||
"type": "github"
|
|
||||||
},
|
|
||||||
"original": {
|
|
||||||
"owner": "NixOS",
|
|
||||||
"ref": "nixos-unstable",
|
|
||||||
"repo": "nixpkgs",
|
"repo": "nixpkgs",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
}
|
}
|
||||||
@ -250,7 +234,6 @@
|
|||||||
"nix-index-database": "nix-index-database",
|
"nix-index-database": "nix-index-database",
|
||||||
"nixos-hardware": "nixos-hardware",
|
"nixos-hardware": "nixos-hardware",
|
||||||
"nixpkgs": "nixpkgs",
|
"nixpkgs": "nixpkgs",
|
||||||
"nixpkgs-unstable": "nixpkgs-unstable",
|
|
||||||
"nur": "nur",
|
"nur": "nur",
|
||||||
"pre-commit-hooks": "pre-commit-hooks",
|
"pre-commit-hooks": "pre-commit-hooks",
|
||||||
"zigpkgs": "zigpkgs"
|
"zigpkgs": "zigpkgs"
|
||||||
|
19
flake.nix
19
flake.nix
@ -2,9 +2,7 @@
|
|||||||
description = "motiejus/config";
|
description = "motiejus/config";
|
||||||
|
|
||||||
inputs = {
|
inputs = {
|
||||||
nixpkgs-unstable.url = "github:NixOS/nixpkgs/nixos-unstable";
|
nixpkgs.url = "github:NixOS/nixpkgs/nixos-23.11";
|
||||||
|
|
||||||
nixpkgs.url = "github:NixOS/nixpkgs/nixos-23.05";
|
|
||||||
flake-utils.url = "github:numtide/flake-utils";
|
flake-utils.url = "github:numtide/flake-utils";
|
||||||
flake-compat.url = "github:nix-community/flake-compat";
|
flake-compat.url = "github:nix-community/flake-compat";
|
||||||
nixos-hardware.url = "github:NixOS/nixos-hardware/master";
|
nixos-hardware.url = "github:NixOS/nixos-hardware/master";
|
||||||
@ -19,7 +17,7 @@
|
|||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
home-manager.url = "github:nix-community/home-manager/release-23.05";
|
home-manager.url = "github:nix-community/home-manager/release-23.11";
|
||||||
home-manager.inputs.nixpkgs.follows = "nixpkgs";
|
home-manager.inputs.nixpkgs.follows = "nixpkgs";
|
||||||
|
|
||||||
agenix = {
|
agenix = {
|
||||||
@ -66,7 +64,6 @@
|
|||||||
outputs = {
|
outputs = {
|
||||||
self,
|
self,
|
||||||
nixpkgs,
|
nixpkgs,
|
||||||
nixpkgs-unstable,
|
|
||||||
agenix,
|
agenix,
|
||||||
deploy-rs,
|
deploy-rs,
|
||||||
flake-utils,
|
flake-utils,
|
||||||
@ -95,12 +92,11 @@
|
|||||||
};
|
};
|
||||||
deployPkgsIA64 = mkDeployPkgs "x86_64-linux";
|
deployPkgsIA64 = mkDeployPkgs "x86_64-linux";
|
||||||
deployPkgsArm64 = mkDeployPkgs "aarch64-linux";
|
deployPkgsArm64 = mkDeployPkgs "aarch64-linux";
|
||||||
mkOverlays = system: [
|
# accepting "system" argument in case we need to construct
|
||||||
|
# nixpkgs-unstable. See git log around the switch from 23.05 to 23.11.
|
||||||
|
mkOverlays = _: [
|
||||||
nur.overlay
|
nur.overlay
|
||||||
zigpkgs.overlays.default
|
zigpkgs.overlays.default
|
||||||
(_final: _prev: {
|
|
||||||
pkgs-unstable = import nixpkgs-unstable {inherit system;};
|
|
||||||
})
|
|
||||||
];
|
];
|
||||||
in
|
in
|
||||||
{
|
{
|
||||||
@ -287,7 +283,7 @@
|
|||||||
hooks = {
|
hooks = {
|
||||||
alejandra.enable = true;
|
alejandra.enable = true;
|
||||||
deadnix.enable = true;
|
deadnix.enable = true;
|
||||||
statix.enable = true;
|
#statix.enable = true;
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
@ -304,9 +300,6 @@
|
|||||||
inherit system;
|
inherit system;
|
||||||
};
|
};
|
||||||
})
|
})
|
||||||
(_final: _prev: {
|
|
||||||
pkgs-unstable = import nixpkgs-unstable {inherit system;};
|
|
||||||
})
|
|
||||||
];
|
];
|
||||||
};
|
};
|
||||||
in {
|
in {
|
||||||
|
@ -5,8 +5,6 @@
|
|||||||
}: {
|
}: {
|
||||||
config = {
|
config = {
|
||||||
hardware.bluetooth.enable = true;
|
hardware.bluetooth.enable = true;
|
||||||
services.blueman.enable = true;
|
|
||||||
services.udev.packages = [pkgs.yubikey-personalization];
|
|
||||||
|
|
||||||
programs = {
|
programs = {
|
||||||
firefox.enable = true;
|
firefox.enable = true;
|
||||||
@ -16,6 +14,8 @@
|
|||||||
mj.base.users.passwd.motiejus.extraGroups = ["adbusers" "networkmanager" "wireshark"];
|
mj.base.users.passwd.motiejus.extraGroups = ["adbusers" "networkmanager" "wireshark"];
|
||||||
|
|
||||||
services = {
|
services = {
|
||||||
|
blueman.enable = true;
|
||||||
|
udev.packages = [pkgs.yubikey-personalization];
|
||||||
acpid.enable = true;
|
acpid.enable = true;
|
||||||
pcscd.enable = true;
|
pcscd.enable = true;
|
||||||
printing = {
|
printing = {
|
||||||
@ -24,13 +24,8 @@
|
|||||||
};
|
};
|
||||||
openssh.settings.X11Forwarding = true;
|
openssh.settings.X11Forwarding = true;
|
||||||
|
|
||||||
# TODO post-23.11
|
logind.powerKey = "suspend";
|
||||||
#logind.powerKey = "suspend";
|
logind.powerKeyLongPress = "poweroff";
|
||||||
#logind.powerKeyLongPress = "poweroff";
|
|
||||||
logind.extraConfig = ''
|
|
||||||
HandlePowerKey=suspend
|
|
||||||
HandlePowerKeyLongPress=poweroff
|
|
||||||
'';
|
|
||||||
|
|
||||||
xserver = {
|
xserver = {
|
||||||
enable = true;
|
enable = true;
|
||||||
|
@ -31,9 +31,7 @@
|
|||||||
oidc = {
|
oidc = {
|
||||||
issuer = "https://git.jakstys.lt/";
|
issuer = "https://git.jakstys.lt/";
|
||||||
client_id = "e25c15ea-41ca-4bf0-9ebf-2be9f2d1ccea";
|
client_id = "e25c15ea-41ca-4bf0-9ebf-2be9f2d1ccea";
|
||||||
# TODO 23.11 from https://github.com/NixOS/nixpkgs/pull/249101/files
|
client_secret_path = "\${CREDENTIALS_DIRECTORY}/oidc-client-secret";
|
||||||
#client_secret_path = "\${CREDENTIALS_DIRECTORY}/oidc-client-secret";
|
|
||||||
client_secret_path = "/run/credentials/headscale.service/oidc-client-secret";
|
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
@ -2,7 +2,6 @@
|
|||||||
config,
|
config,
|
||||||
lib,
|
lib,
|
||||||
myData,
|
myData,
|
||||||
pkgs,
|
|
||||||
...
|
...
|
||||||
}: let
|
}: let
|
||||||
cfg = config.mj.services.tailscale;
|
cfg = config.mj.services.tailscale;
|
||||||
@ -20,7 +19,6 @@ in {
|
|||||||
config = mkIf cfg.enable (mkMerge [
|
config = mkIf cfg.enable (mkMerge [
|
||||||
{
|
{
|
||||||
services.tailscale.enable = true;
|
services.tailscale.enable = true;
|
||||||
services.tailscale.package = pkgs.pkgs-unstable.tailscale;
|
|
||||||
networking.firewall.checkReversePath = "loose";
|
networking.firewall.checkReversePath = "loose";
|
||||||
networking.firewall.allowedUDPPorts = [myData.ports.tailscale];
|
networking.firewall.allowedUDPPorts = [myData.ports.tailscale];
|
||||||
}
|
}
|
||||||
|
Loading…
Reference in New Issue
Block a user